Height fields and depth maps which we collectively refer to as z-fields, usually carry a lot of redundant information and are often used in real-time applications. This is the reason why efficient methods for their si...
详细信息
Accurate and reliable visualization of blood vessels is still a challenging problem, notably in the presence of morphologic changes resulting from atherosclerotic diseases. In this paper we take advantage of partially...
详细信息
Recently I. Jensen published a novel transfer-matrix algorithm for comp.ting the number of polyominoes in a rectangular lattice. However, his estimation of the comp.tational comp.exity of the algorithm (O((√2) n)) wh...
详细信息
ISBN:
(纸本)0898715644
Recently I. Jensen published a novel transfer-matrix algorithm for comp.ting the number of polyominoes in a rectangular lattice. However, his estimation of the comp.tational comp.exity of the algorithm (O((√2) n)) where n is the size of the polyominoes), was based only on empirical evidence. This paper is based primarily on an analysis of the number of some class of strings that plays a significant role in the algorithm. It turns out that this number is closely related to Motzkin's numbers. We provide a rigorous comp.tation that roughly confirms Jensen's estimation. We obtain the bound O(n5/2(√3)n) on the running time of the algorithm, while the actual number of polyominoes is about C4.06n/n, for some constant C > 0.
A video watermarking which resists affine transformations is proposed. A template along the time axis is inserted in each Watermark Minimum Segment (WMS) of the video sequence. Experimental results show that the water...
详细信息
A video watermarking which resists affine transformations is proposed. A template along the time axis is inserted in each Watermark Minimum Segment (WMS) of the video sequence. Experimental results show that the watermark information can be detected blindly in watermarked frames subjected to reasonable affine transformations.
Inspecting large industrial plants in a virtual walkthrough environment has proven to be a valuable tool in Plant Design. Many CG techniques, such as various LOD and culling methods, have been developed to visualize c...
详细信息
Inspecting large industrial plants in a virtual walkthrough environment has proven to be a valuable tool in Plant Design. Many CG techniques, such as various LOD and culling methods, have been developed to visualize comp.ex models in VR environments. These techniques decide solely based on geometric properties how to optimize the scene. In this paper we introduce the concept of semantically controlled selection of those techniques and show how semantic considerations can enhance the CAD to VR conversion process for large model visualization (LMV) walkthroughs of Plant Design models, improving the performance and adapting the visualization to the users' needs. A taxonomy, together with semantic considerations coming from the relationship between user, model, and resources is the basis to decide which rules should be applied for a specific visualization technique. By extending a LMV walkthrough system we are able to reduce the comp.exity of large industrial plant models by a factor of two. On a common workplace PC the semantic preprocessing takes only 10-20 minutes for models with 106 to 10 polygons. Our approach is orthogonal to commonly known CG techniques and can be combined beneficially with those approaches.
Background: The preoperative planning of liver resections is commonly based on two-dimensional imaging techniques such as sonography, comp.ted tomography (CT), and magnetic resonance imaging. The operability of liver ...
详细信息
Background: The preoperative planning of liver resections is commonly based on two-dimensional imaging techniques such as sonography, comp.ted tomography (CT), and magnetic resonance imaging. The operability of liver tumors depends on the three-dimensional relation of the parenchyma to be resected to the intrahepatic vascular structures which define the autonomously functioning liver segments. Our aim was to establish a liver surgery planning system (LSPS) for major liver resections by augmented-reality (AR) techniques for the accurate evaluation of operability. Methods: The system provides methods for the processing and preparation of the input CT data, three-dimensional visualization, and resection planning. The output consists of quantitative indices (e.g., volume of liver tumors or segments) and an elaborated plan for the surgical procedure including information like the number of liver segments subject to resection and their spatial arrangement or the volume of the remaining or the removed liver tissue. Basically, the LSPS comp.ises two main comp.nents, a medical image analysis and an AR system. The medical image analysis part is responsible for the segmentation of the liver, the vascular structures, and the tumors and for liver segment approximation. The AR system is utilized for visualization and various kinds of user interaction. Results: Experiments with anonymized CT data sets demonstrated the ability of surgeons to deal with different tasks in resection planning after a brief introduction. This led also to a high acceptance by colleagues who wanted to get information for their surgical strategy as quickly as possible. Conclusions: Quantitative measurements are of major importance for the planning of liver resections, for which precise measurements of distances and volumes are required. On the basis of the patient's CT dataset, the LSPS supports an effective way to find the optimal surgical strategy for each patient. The flexible design of this system allo
Vehicle occupants that are out-of-position can be deadly injured by the deployment of the air bag in a crash situation. In recent years many different sensors and systems have been proposed to detect the type of occup...
详细信息
Vehicle occupants that are out-of-position can be deadly injured by the deployment of the air bag in a crash situation. In recent years many different sensors and systems have been proposed to detect the type of occupant and the position of the occupant's head. This paper presents a method for classification and occupant's head detection based on passive stereo vision. The proposed system uses depth surface analysis and scene statistics together with support vector machines for classification and selection of head candidates. Evaluation of the method shows 99% correct for classification and 98% correct for head detection, using large sets of image data, and image sequences recorded in a driving vehicle.
Usually, image zooming is an interpolation of the original image, achieving high quality zooming image as fast as possible. But it is well known that many traditional interpolation methods such as bilinear or bicubic ...
详细信息
Usually, image zooming is an interpolation of the original image, achieving high quality zooming image as fast as possible. But it is well known that many traditional interpolation methods such as bilinear or bicubic often suffer from blurring edges or introduce zigzag errors. In this paper, a new adaptive image interpolation method based on edge, introducing rectangular interpolation and quincunx interpolation, putting forward the gradient weight function, motivated by the work of Nira Shezaf et al., is presented. The experimental results show that the new method can improve the quality of zoomed image effectively. At last, an evaluation is presented assess the quality of zoomed image.
The technique of image interpolation is usually required in image zooming. In this paper we make some changes to Hausdorff distance based on the theory of Hausdorff measurement. Then we use the changed Hausdorff dista...
详细信息
The technique of image interpolation is usually required in image zooming. In this paper we make some changes to Hausdorff distance based on the theory of Hausdorff measurement. Then we use the changed Hausdorff distance to evaluate the interpolation algorithms. And also we comp.re it with other evaluation methods and we can find that Hausdorff distance has better results and more identical to the vision impress.
comp.icated information systems under network environment commonly faced with problems of end-users rights identification, right properties definition, dynamic rights configuration, and active protection under an open...
详细信息
comp.icated information systems under network environment commonly faced with problems of end-users rights identification, right properties definition, dynamic rights configuration, and active protection under an open or semi-open environment, whereas traditional users' static rights configuration management and direct authorization couldn't solve these problems. The user control strategies based on authorization objects were proposed, which consisted of three stages: identification authentication, access control and operation monitor. In identification authentication stage, the user's identification authorization under an open and semi-open environment was solved. In access control stage, authorization object was introduced to resolve rights properties definition, dynamic rights assignment, and rights identification of end-users. And the operation monitor stage was mainly focused on active protection.
暂无评论